June grade 12 terminology Flashcards

1
Q

4G (LTE)

A

4G is the fourth generation of cellular wireless standard and is a successor to 3G. 4G
networks use different frequencies to transmit data and should achieve far higher speeds that
3G.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

64-bit

A

64-bit computers have a processor that work with 64 bits at a time. This means that memory
addresses, register sizes, address and data bus sizes and instruction sizes are all 64 bits in
length. In other words the computer is able to process at most 64 bits of data at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access point

A

Also called a base station, consists of a sender/receiver (transceiver) and an antenna which
transmits and receives radio signals so that the devices that have a wireless network card are
able to communicate with the rest of network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activation codes

A

A series of letters and digits that must be entered during software installation to authenticate
that copy of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ADSL

A

Asymmetric digital subscriber line Digital Subscriber Line. Used by homes and businesses
for dedicated dig ital high speed connection to the internet over conventional phone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adware

A

Software that automatically displays or downloads advertising material such as banners or
pop- ups when a user is online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Anomalies

A

Errors which occur when editing a database that has not been normalised. They include
UPDATE, INSERT and DELETE anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anti virus software

A

Anti-virus software is a program or set of programs that are designed to detect, prevent and
remove software viruses, and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface. The form of an API varies depending on the type of
programming language but often it is a library of programming modules which facilitate the
creation of applications which communicate with the Operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Archive

A

To copy and compress data files to a long-term storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BitTorrent

A

BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth
required to transfer files. For example, if a user begins downloading a movie file, the
BitTorrent system will locate multiple computers with the same file and begin downloading
the file from several computers at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Artificial Intelligence

A

Simulation of human decision-making processes by a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assembler

A

A program that translates a programmer’s code, written in Assembly Code, into executable
machine code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BIOS

A

Basic Input Output System – the essential start up instructions of a computer, stored in ROM
on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blockchain

A

A system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asymmetric
Encryption

A

Cryptographic algorithms (keys) which comprise of two separate keys, one of which is secret
(or private) and one of which is public. The pair of keys are mathematically linked but one
cannot be derived from the other, i.e. if a user has the public key he cannot work out the
private key (or vice versa).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attenuation

A

Attenuation is the reduction in signal strength while transmitting data. The further the signal
gets from the source the weaker it will become.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Audio and Video on
Demand (AVOD)

A

Video on demand (VOD) or audio and video on demand (AVOD) are systems which allow
users to select and watch/listen to video or audio content when they choose to, rather than
having to watch at a specific broadcast time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Usage Policy, a document that outlines the rights and responsibilities of users
within a network environment, including the consequences of violating these stipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Audit trail

A

An audit trail (also called audit log) is a security-relevant chronological record, set of
records, and/or destination and source of records that provide documentary evidence of the
sequence of activities that have affected at any time a specific operation, procedure, or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Backup

A

A copy of data files and other relevant files stored to enable full restoration of service in the
event of data loss. There is a trend towards cloud based backup services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bandwidth

A

The total amount of data that can be transferred from one point to another in a given period
of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Biometrics

A

Security based on identification of unique physical characteristics of a person such as
fingerprints and retina.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Big Data

A

Big data is a combination of structured, semistructured and unstructured data collected by
organizations that can be mined for information and used in machine learning projects,
predictive modeling and other advanced analytics applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Blog

A

A blog reads like a journal with the most recent entry at the top.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Botnets

A

Also known as a zombie army. A botnet is a group of computers which have been infected by
malware and are controlled from a server to run related software programs and scripts. Often
utilised to forward spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HTTPS

A

Hypertext Transfer Protocol Secure (HTTPS) is a secure variant of HTTP that adds a layer of
security on the data in transit through a secure socket layer (SSL) whereby the entire
webpage is encrypted before transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bluetooth

A

A wireless technology that allows devices such as a mouse, printers and cellphones to
communicate over a relatively short distance, typically less than 10 m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

HTTP

A

HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on
the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Control unit

A

The Control Unit (CU) section of the CPU directs all CPU operations. It controls the fetch
execute cycle and sequence of operations and interprets the instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Cookie

A

A collection of information, stored in a small text file on the local computer of a person using
the World Wide Web, used chiefly by websites to identify users who have previously
registered or visited the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Bridge

A

Device that links two networks segments and can reduce network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Buffer

A

A ‘data buffer’ is a region of memory which is used to temporarily hold data while it waits for
some form of further processing often by a slower or busier device that cannot handle the
data immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Bus

A

A set of electrical paths etched on a motherboard to transport data, instructions or addresses
between components on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cache memory

A

Instructions and data are prefetched from slower RAM and placed cache in order to speed up
the CPUs processing. Cache memory is made up of SRAM chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Caching

A

The principle of using a faster device to speed up access from a slower device. For example
disk caching is where RAM is used to store blocks of data to speed up access from the slower
hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Cap

A

A bandwidth cap limits the total amount of data which can be downloaded over a given
period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Check digit

A

Number added to a code (such as a bar code or account number) to verify that transmitted
data is received correctly. The check digit before transmission should remain the same on
the receipt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Chipset

A

A chipset is a group of integrated circuits that work together. It is a set of chips used on a
motherboard to connect components. For example the Northbridge (connected to fast
components such as RAM) and the Southbridge (connected to slower components such as
the HDD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Client-server

A

Client: A client is a computer terminal that retrieves information from or uses resources
provided by a server. Server: A powerful computer which provides services to clients on a
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cloud Computing

A

Cloud computing is an Internet service which can provide on-line applications, store data
on-line and in a recent trend provide hardware for use on-line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CMOS

A

Complementary Metal Oxide Semiconductor – A technology for producing the type of
memory that stores the various user configurable computer startup settings that can be
updated or changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Compiler

A

A program that translates an entire high level program source code into object code. The
object code is machine code which may be used to create standalone ‘executable files’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Composite keys/
compound key

A

A composite key is a combination of two or more fields in a table to create a Primary Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Compression

A

Compression is the process of applying an algorithm to a file to reduce its size. Lossless
compression is where data is compressed without losing any portion of the data. It allows the
exact original data to be reconstructed. Lossy compression loses detail so that the file is not
restored to its original size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

GPU

A

Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render
images stored in the RAM of the graphics card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Hardware Interrupt

A

A signal to the CPU indicating a device needs attention. For example, a mouse click or a
keystroke.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

HDMI

A

High-Definition Multimedia Interface for transferring high definition video and audio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Hoaxes

A

An email that provides a warning about a virus, worm or some other disaster, and urges
recipients to forward the message thereby generating unnecessary traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Hot-pluggable/Hotswappable

.

A

Hot plugging is the ability to replace or install a device without shutting down the attached
computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Hotspot

A

An area, usually in a public space such as an airport, restaurant or hotel lobby, where people
may receive and be granted WiFi access from an access point to connect wirelessly to the
Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

HTML

A

Hypertext Markup Language used to create webpages. The tags (<h1>This is a
heading</h1>) are translated by web browsers into the graphical representation shown on the
computer screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

HTTP

A

HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on
the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

WeB LOG

A

Websites updated regularly with news and events in chronological order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Copyright

A

The exclusive legal right to reproduce, publish, sell, or distribute original work (such as
computer publications, graphics and software).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Cyber crimes

A

Criminal activity using computers on the Internet or any network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Dark Web

A

The dark web is the part of the World Wide Web that is only accessible by means of special
software, allowing users and website operators to remain anonymous or untraceable. The
dark web forms a small part of the deep web, the part of the Web not indexed by web search
engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Data dependency

A

A data dependency in a database is where one field has a dependency or relationship with
another field. For example knowing a person’s ID number can produce their name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Data Integrity

A

Data integrity refers to the overall completeness, accuracy and consistency of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Data mining

A

The use of sophisticated software to examine a large volume of information stored in many
databases on-line to discover patterns and trends. Usually aimed at transforming large
volumes of unstructured data in a form that can be used to make decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Data redundancy

A

Data redundancy occurs in database systems where a field is repeated unnecessarily as a
result of a one-to-many or many-to-many relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Data verification

A

Checking to ensure that captured data is a legitimate copy of inputted data. Performed when
data has been entered. For example inputting a password twice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Data warehouse

A

A data warehouse is a database storing data from many sources over a period of time for
reporting and data analysis in order to make decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Data structure

A

A data structure is a specialised format for organising and storing data in a program. General
data structure types include the array, the file, the record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Data validation

A

Checking that captured data is logically correct and falls within acceptable ranges for that
data. Validation is performed at the time of input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Data verification

A

Checking to ensure that captured data is a legitimate copy of inputted data. Performed when
data has been entered. For example inputting a password twice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Data warehousing

A

A data warehouse is a database storing data from many sources over a period of time for
reporting and data analysis in order to make decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Database
management system
(DBMS)

A

Database Management System is software that provides database functionality to physical
users or client software that needs data. These systems are capable of storing large amounts
of structured data which can be easily queried and accessed using SQL or other similar
languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

DDR Memory

A

Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

DDR Memory

A

Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Defragmentation

A

The process of locating the non-contiguous fragments of data into which a computer file may
be divided as it is stored on a hard disk, and rearranging the fragments and restoring them
into fewer fragments or into the whole file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Denial of service
attack (DoS)

A

A ‘denial-of-service’ attack is characterised by an explicit attempt by attackers to prevent
legitimate users of a service from using that service. Examples include attempts to ‘flood’ a
network, thereby preventing legitimate network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Derived data

A

Data in the field of a database which has been created from two or more existing fields in the
database table, for example: calculating the age from the date of birth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Device driver

A

A device driver is a computer program that provides communication between the device and
the Operating System. A piece of software that controls a peripheral on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

DHCP

A

The Dynamic Host Configuration Protocol is a standardised network protocol that is used by
network server to provide a unique IP address to all nodes as they join the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Digital Divide

A

The digital divide refers to the difference between people who have easy access to the
Internet and IT resources and those who do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Digital signature

A

Data added to a file to authenticate its source. The Digital signature is verified by consulting
a Digital Authority organisation which keeps an original record of the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Distributed
processing

A

Refers to a network setup where individual terminals have sufficient processing power to
complete their tasks without reference to a central powerful server (refer to Centralised
Processing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Distributed database

A

A system where parts of a database (the data and the DBMS) are spread (distributed) across
servers in separate locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

DNS (Domain Name
Service/ Server)

A

An Internet service that maps domain names to numerical IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Domanin name

A

Domain name A string that translates back to an IP address to allow access to a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

DRAM

A

Dynamic RAM. A memory chip that uses capacitors and needs to be refreshed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Duplicate data

A

Data that is repeated in the database for valid reasons. For example two people living in the same suburb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

EEPROM

A

Electronically Erasable Programmable Read Only Memory – a type of ROM that can be
erased electronically, after which a new ‘image’ of the upgraded contents can be written back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

GPU

A

Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render
images stored in the RAM of the graphics card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Hardware interrupt

A

A signal to the CPU indicating a device needs attention. For example, a mouse click or a
keystroke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

E-book

A

An electronic version of a printed book which can be read on a computer or a specifically
designed handheld device A publication/book made available in digital/electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Embedded Operating
System

A

A dedicated operating system installed in mobile handheld devices, appliances, equipment
and vehicles. Normally on a ROM chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

EMI

A

Electro Magnetic Interference. The disruption of signal caused by proximity to an
electromagnetic field from another electronic device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Emulation

A

Emulation is the process of duplicating the function of a computer system in a computer not
designed for that system, for example, running PC software on an Apple computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Encryption

A

Converting data into an unreadable form according to a specified set of rules to ensure the
privacy of data during communication, or for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Ergonomics

A

The practice of designing equipment/furniture/etc. so that it minimises strain on the human
body, e.g. ergonomic keyboards, mouse, chairs, etc.

93
Q

Ethernet

A

System for connecting a number of computer systems in a LAN, with reference to
communication protocols, transmission speeds and media, collision management and
hardware.

94
Q

Extranet

A

An organisation’s intranet (or part thereof) which is available to other users outside the
organisation.

95
Q

Fat Client

A

A computer with full CPU, memory, backing storage and local software connected to a
network using a Server-Client setup.

96
Q

Firewall

A

Hardware and/or software that monitors the traffic between a computer and the Internet, to
safeguard against breaches in security.

97
Q

Firewire

A

A high speed port developed by the Apple corporation to transfer high volume data such as
video
.

98
Q

Firmware

A

Software that is permanently installed on a ROM chip.

99
Q

Flaming

A

Posting or sending offensive messages over the Internet.

100
Q

Flash memory

A
101
Q

Flash memory

A

Flash memory is a type of EEPROM (electronically erasable programmable ROM) used in
memory cards, USB memory-sticks, music players, cell phones and solid-state drives.

102
Q

Foreign keys

A

A field in a table (not a primary key) which contains data that exists in the primary key field
of another table. The mechanism by which relations are created between the tables of a
relational database.

103
Q

Freeware

A

Software that is distributed freely. You do not receive the source code. There is no limitation
on the time or functionality included.

104
Q

Front Side Bus

A

A high speed bus which connects the CPU and the Northbridge. The Northbridge connects to
faster components on the motherboard, primarily RAM.

105
Q

FTP (File Transfer
Protocol)

A

The protocol used for the transfer of files between remote computers that have an Internet
connection.

106
Q

GIGO

A

‘Garbage In, Garbage Out’; the quality of the output for any computer system is directly
related to the quality of the input.

107
Q

Global Unique
Identifiers

A

A globally unique identifier (GUID) is a 128-bit number created by the Windows operating
system or another Windows application to uniquely identify specific components, hardware,
software, files, user accounts, database entries and other items. It is a term used by Microsoft
for a number that its programming generates to create a unique identity for an entity such as
a Word document.

108
Q

Hybrid hard drives

A

Hybrid hard drives blend HDD capacity with SSD speeds by placing traditional rotating platters and a small amount of high-speed flash memory on a single drive. Hybrid storage products monitor the data being read from the hard drive, and cache the most frequently accessed bits to the high-speed NAND flash memory.

109
Q

Hyper threading

A

Hyperthreading (HT) technology uses two sets of registers on the CPU to simulate a second CPU allowing for fast context switching between processes.

110
Q

IAAS

A

Infrastructure as a Infrastructure as a service is where computer resources, such as hardware, software and networks are owned and hosted by a service provider and offered to customers on- demand.

111
Q

Interactive processing

A

Interactive processing is where a program produces output in response to input while the program is running.

112
Q

Interpreters

A

Software that translates programming instructions into machine code one line at a time and executes them immediately.

113
Q

Interrupt

A

A signal sent to the CPU indicating that a device or process needs attention.

114
Q

Intranet

A

An organisation’s internal web site that usually provides access to various documents and
resources.

115
Q

IP address

A

An address for a device in a TCP/IP network.

116
Q

IrDA

A

The Infrared Data Association (IrDA) is a set of protocols for wireless infrared
communications.

117
Q

ISP

A

ISP Internet Service Provider. A company which provides access to the Internet.

118
Q

Json

A

JavaScript Object Notation is a platform-independent, human readable, text file used for
transferring data between web services and browsers or applications

119
Q

Keylogger

A

Malware that sits in a computer’s memory without the users knowledge and records
keystrokes and then sends them to a remote computer. Used to find usernames, passwords,
etc.

120
Q

LBS (Location
Based Services)

A

Software applications that make use of GPS-enabled devices’ locations to provide more
relevant information to users. A piece of software that uses data about your physical position
to control features of an application.

121
Q

MAC Address

A

Media Access Control address. A unique identifier assigned to a network device by the
manufacturer (e.g. a network card or wireless router), for example, B1:3C:45:AC:8D:FF (6
groups of hexadecimal numbers).

122
Q

Machine Cycle

A

Steps taken by the CPU in carrying out instructions: Fetching instructions and data from the
memory (RAM); Decoding the instructions; Executing the instruction; Transferring data
back to the memory.

123
Q

Malware

A

Malicious software installed without users’ knowledge and designed to negatively affect the
operation of a computer system.

124
Q

Microblog

A

The posting of short text entries usually via a cellphone or smartphone, on a platform like
Twitter.

125
Q

Microwave
transmission

A

A high speed line of sight technology for wireless connection. (A microwave refers to
electromagnetic energy having a frequency higher than 1 gigahertz)

126
Q

Modular design

A

A computer design philosophy which incorporates a variety of re-usable stand-alone
components, thereby facilitating upgrades and maintenance.

127
Q

MPEG

A

The digital compression standards and file formats developed by the Moving Picture Experts
Group. MPEG-4 is the latest standard.

128
Q

Multi Core

A

A technology where 2 or more complete microprocessors are built into a single CPU chip,
e.g. Dual-core; Quad-core.

129
Q

Multi-processing

A

Processing technique where multiple tasks are processed on more than one physical
processor/core.

130
Q

Multi-tasking

A

Descriptive of an operating system which can execute two or more independent task
simultaneously, as in multicore and hyperthreading, or the OS can appear to run two or more
tasks simultaneously in a single CPU by Time-Slicing

131
Q

Multi-threading

A

The ability of a program to create independent parts called threads. For example
downloading a file in a web browser while searching for a web page. When a CPU has
multiple cores, each thread can be run on a different core at the same time

132
Q

Netiquette

A

Netiquette is etiquette on the internet. It is a set of rules which specify appropriate behaviour
when communicating over the internet.

133
Q

Network backbone

A

A part of a network that connects all other parts of the same network together.

134
Q

Normalisation –
1NF, 2NF, 3NF

A

The process of designing a database by splitting the data into related tables to reduce data
redundancies and to avoid anomalies such as update, insert and delete which threaten the
integrity and usability of the database.

135
Q

Northbridge

A

Part of a chipset by Intel which controls the communication between the CPU, Primary
memory and the faster components on the motherboard, e.g. accelerated graphic ports and
PCI.

136
Q

Onion routing

A

Onion routing is a technique for anonymous communication over a computer network. In an
onion network, messages are encapsulated in layers of encryption, analogous to layers of an
onion. The encrypted data is transmitted through a series of network nodes called onion
routers, each of which “peels” away a single layer, uncovering the data’s next destination.

137
Q

Overclocking

A

Overclocking is the process of making a computer or component operate faster than the clock
frequency specified by the manufacturer by modifying system parameters. Most
overclocking techniques increase power consumption, generating more heat, which must be
dispersed if the chip is to remain operational.

138
Q

PAAS

A

Platform as a Service is part of cloud concept that provides a computing platform for the
development of software by users

139
Q

Parallel Sets

A

Parallel Sets (ParSets) is a visualization application for categorical data, like census and
survey data, inventory, and many other kinds of data that can be summed up in a
cross-tabulation

139
Q

Parallel Sets

A

Parallel Sets (ParSets) is a visualization application for categorical data, like census and
survey data, inventory, and many other kinds of data that can be summed up in a
cross-tabulation

140
Q

Parameters

A

A list of data which is passed into a method, procedure or function. Usually each parameter
has a name and type associated with it, shown in the brackets after a method, procedure or
function name

141
Q

PCI Express

A

PCI Express is bus design for communication between CPU, memory. It uses serial
connections and a switch to provided dedicated point-to-point link between components on a
motherboard

142
Q

Peer-to-peer network

A

A network in which each workstation has the same rights. Each
terminal controls the files on
its local drive and attached hardware determining whether it may be shared by others on the
network. It is characterised by the absence of a server.

143
Q

Peripheral

A

Any computer hardware device, such as a printer, that you connect to your PC via an USB
Port. It is not part of the essential computer, i.e. the memory and microprocessor.

144
Q

Pharming

A

When a hacker attempts to redirect your web traffic to a fake Web site that looks legitimate.
The fake Web site requests you to enter confidential information.

145
Q

Phishing

A

Attempts from people, generally employing e-mail with links, to direct users to fake
websites, where they are tricked into releasing personal information (e.g. passwords)

146
Q

Plug and Play

A

A technology that automates the installation and configuration process of a new device.

147
Q

Plug-ins

A

Programs which add extra features to software, such as a web browser. These programs are
needed to allow the user to view ‘special’ effects.

148
Q

Podcast

A

Audio/Video files that are designed to be downloaded and played on mobile devices such as
an iPod.

149
Q

Polymorphism

A

In object-oriented programming, polymorphism refers to a programming language’s ability to
process objects differently depending on their data type or class. For example, see method
overriding and method overloading. Methods which have the same signature but different
functionality.

150
Q

POP3 (Post Office
Protocol 3)

A

The most common protocol used for downloading e-mail via the Internet from POP3 servers.

151
Q

Portal

A

A Web portal or public portal refers to a Web site or service that offers a broad array of
resources and services, such as e-mail, forums, search engines, and online shopping malls.

152
Q

Portal

A

A Web portal or public portal refers to a Web site or service that offers a broad array of
resources and services, such as e-mail, forums, search engines, and online shopping malls.

153
Q

POS

A

Point Of Sale software. The software used to manage tills in shops and supermarkets.
Usually linked to some form of stock control software.

154
Q

POST

.

A

Power On Self Test – start-up test performed by the BIOS to ensure that all essential
hardware (RAM, keyboard, etc.) is present and in working order.
Primary key A field or combined fields which act as a unique identifier of a record.
Protocol A set of rules and regulations which govern data transmission.

155
Q

Proxy server

A

A server in an organisation to cache web pages in order to reduce network traffic. All
subsequent requests to the same site on the Internet will be provided by the proxy server.

156
Q

RAD

A

Rapid Application Development is a software development methodology that uses minimal
planning in favour of rapid prototyping. The lack of extensive pre-planning generally allows
software to be written much faster, and makes it easier to change requirements

157
Q

RAID

A

Redundant Array of Inexpensive/Independent Disks – the configuration of two or more hard
drives to act as one large storage utility, designed to minimise the possibility of data loss by
storing the data across all of the Disks (Data Striping) and providing a redundant copy of the
data (Mirroring).

158
Q

Range check

A

A method of checking the validity of input data by determining whether the values fall
within an expected range.

159
Q

Ransomware

A

Ransomware is a type of malicious software from cryptovirology that threatens to publish the
victim’s data or perpetually block access to it unless a ransom is paid.

160
Q

Registers

A

A register is a small amount of storage space on a CPU to store the current instruction to be
processed.

161
Q

Remote Access

A

In computer networking, remote access technology allows logging into a system as an
authorised user without being physically present at its keyboard.

162
Q

Repeater

A

A repeater is an electronic device that receives a signal and boosts it at a higher level or
higher power so that the signal can cover longer distances

163
Q

RFID

.

A

Radio-frequency identification (RFID) is the wireless use of radio-frequency electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects.

164
Q

RIA (Rich Internet
Applications)

A

A web application that is designed to deliver the functions and features of a traditional
desktop application. Web browsers are required for access. Unlike traditional applications,
the installation of software is not needed.

165
Q

ROM

A

Read-Only Memory is non-volatile memory chip where the contents are retained after power
is switched off.

166
Q

Rootkit

A

Collection of programs designed to use administrator rights to gain control of a computer for
malicious purposes.

167
Q

Router

A

A device that makes it possible for networks to communicate over the Internet, by directing
data packets to its correct destination by determining the best path. The global standard
routing is TCP/IP.

168
Q

RSI

A

Repetitive Strain Injury are injuries caused by repetitive tasks, for example, prolonged use of
the mouse causing Carpal Tunnel Syndrome in the wrist.

169
Q

SAAS

A

Software as a service is a software delivery model in cloud computing in which software and
associated data are centrally hosted on the cloud by independent software vendors (ISVs) or
application service providers (ASPs), e.g. Google Apps.

170
Q

SATA

A

An interface suitable for connecting a hard disk drive.

171
Q

SATA

A

An interface suitable for connecting a hard disk drive.

172
Q

Semantic Search
Engine

A

Semantic search is a data searching technique in a which a search query aims to not only find
keywords, but to determine the intent and contextual meaning of the words a person is using
for search in order to return more relevant results.

173
Q

Server Virtualisation

A

Server virtualisation is the act of replacing the functions of several separate physical servers
with one piece of hardware. Several instances of server operating system can be installed on
this virtual host. This provides for more efficient use of the hardware and energy and allows
for fault tolerance.

174
Q

Siphoning

A

Siphoning is a technique used to fraudulently redirect traffic that would normally be directed
to website in search engine results.

175
Q

SMTP (Simple Mail
Transfer Protocol)

A

The most common protocol used for sending e-mail via SMTP servers on the Internet.

176
Q

Social Engineering

A

Any attempt to manipulate someone into installing malware or giving out sensitive or
personal information.

177
Q

Social Engineering

A

Any attempt to manipulate someone into installing malware or giving out sensitive or
personal information.

178
Q

Software Interrupt

A

A signal to the CPU by a program or process indicating a program experiencing a problem
such as invalid user input, or a divide by 0 error.

179
Q

Southbridge

A

The Southbridge is one of the two chips in the core logic chipset on a personal computer
motherboard, the other being the Northbridge. The Southbridge connects slower components
such as the HDD.

180
Q

Spoofing

A

The substitution of email or web site addresses with false addresses in order to make a email
or web site appear legitimate.

181
Q

Spyware

A

A form of malware that tries to monitor and track the way you use your computer to discover
confidential information, and then relay this to a third party. Keyloggers are an example of
Spyware

182
Q

SRAM

A

Static Random Access Memory is memory that does not require constant refreshing of the
data it stores. This makes it faster than dynamic RAM as clock cycles aren’t spent refreshing
data.

183
Q

SSL

A

Secure Sockets Layer is a protocol for transmitting private documents via the Internet. SSL
encrypts data before sending.

184
Q

Streaming

A

The progressive download of files (usually video or audio) over the internet. The file is not
saved to your device. On-demand services for audio and video are available.

185
Q

Voice over Internet
Protocol (VoIP)

A

A protocol that allows telephone calls to be made over LANs, WANs and the Internet

186
Q

Switch

A

An Ethernet Switch is device used to manage network collisions and to act as physical
connection point for network cabling.

187
Q

Synchronise

A

The process where data files on different devices are updated with the latest copy so that both
versions of the files are identical.

188
Q

System Clock

A

A small quartz crystal that pulses at a regular frequency measured in GHz; used to coordinate
activities on a motherboard.

189
Q

System Utility

TCP/IP TCP/IP is a protocol suite that is widely used to transmit information in networks.

A

A program that performs a very specific task, usually related to managing system resources.
System software performs ‘housekeeping like’ tasks.

190
Q

Thin Client

A

A computer on a network with reduced CPU, memory and storage. Relies on a powerful
server on the network to perform most of these functions. Some thin client solutions have no
storage at all.

191
Q

Thunderbolt

A

A fast connection technology replacing firewire and offering speeds of 10Gbs.

192
Q

Tor

A

Tor is free software for enabling anonymous communication. The name is derived from an
acronym for the original software project name “The Onion Router”. Tor directs Internet
traffic through a free, worldwide, volunteer overlay network consisting of more than seven
thousand relays to conceal a user’s location and usage from anyone conducting network
surveillance or traffic analysis.

193
Q

Twitter

A

A microblog which limits entries to 280 characters.

194
Q

UML

A

Unified Modelling Language is a set of design methods and tools used for designing and
engineering object-oriented software. These tools include class diagrams, use case diagrams
and interaction diagrams.

195
Q

Unicode

A

Unicode is 2 byte code developed to represent all known human language characters on a
computer.

196
Q

UPS

A

An Uninterruptible Power Supply is a large rechargeable battery. It maintains sufficient
power to allow a server to keep running until it can shut down cleanly and safely. A UPS also
smoothes the power output coming from the mains to avoid power spikes which would likely
damage a computer.

197
Q

URL

A

A Uniform Resource Locator is a string which consists of the protocol + the domain name +
the website file being accessed, for example, http://mysite.com/index.html.

198
Q

URL

A

A Uniform Resource Locator is a string which consists of the protocol + the domain name +
the website file being accessed, for example, http://mysite.com/index.html.

199
Q

Virtual machine

A

A virtual machine is a software emulation of a computer which can execute programs as
though it were the actual machine.

200
Q

Virtual memory

A

Using an area on the hard disk as an extension to RAM. The data in RAM is divided into
pages which swopped in and out of memory from the hard disk whenever the application in
memory requires them. Virtual memory slows down the performance.

201
Q

Virtual Reality (VR)

A

Virtual reality (VR) is a simulated experience that can be similar to or completely different
from the real world. Applications of virtual reality include entertainment (particularly video
games), education (such as medical or military training) and business (such as virtual
meetings). Other distinct types of VR-style technology include augmented reality and mixed
reality, sometimes referred to as extended reality or XR

202
Q

Virtual Private
Network (VPN)

A

A network implemented via a public network such as the Internet. This enables the user to
log onto a network from a remote location with the same benefits of privacy and security as a
LAN.

203
Q

Virus

A

A computer virus is a malicious program that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves.

204
Q

Vlog (Video Blog)

A

A form of blog which uses video as the medium. Entries normally combine video supported
by text and images.

205
Q

Vodcast (Video
Podcast)

A

A form of podcast which includes video clips or photos and is downloaded and played as a
movie.

206
Q

Voice over Internet
Protocol (VoIP)

A

A protocol that allows telephone calls to be made over LANs, WANs and the Internet.

207
Q

WAP

A

Wireless Application Protocol is an internet based protocol for transferring data to small
handheld devices.

208
Q

Web 1.0

A

Earliest stage in the evolution of the WWW, characterised by mostly static content and a
‘read- only’ role on the part of the consumer public.

209
Q

Web 2.0

A

The next stage in the evolution of the WWW, characterised by more dynamic content and an
interactive ‘read-write’ role on the part of the consumer public. Content consumers can
become content creators as well, for example, on social networking sites.

210
Q

Web 3.0

A

Semantic Web is another name for the Web 3.0.

211
Q

Wiki

A

A website where users can collaboratively modify, add or delete its content. Much more than
just an encyclopaedia.

212
Q

Wi-Max

A

An upgrade of WiFi technology, allowing for more secure communication at greater speed
over a wider area.

213
Q

Zombies

A

A zombie is a computer connected to the Internet that has been compromised by a hacker,
computer virus or Trojan horse and can be used to perform malicious tasks of one sort or
another under remote direction. Botnets of zombie computers are often used to spread e-mail
spam and launch denial-of-service attacks.

214
Q

Access Modifier

A

A keyword defining the visibility of a method or field in a class. Private access modifier
indicates that the field or method is only visible inside the class, public indicates it is
available outside the class and protected indicates it is available within the package.

215
Q

Accessor

A

A function that returns the value of a private field in an object.
Attribute Fields or property of a class defining the data associated with each object.

216
Q

Class

A

A class is the definition used to create instances of itself, called objects. Classes define the
attributes and methods that each object created from that class will have.

217
Q

Constructor

A

A constructor is the method which instantiates an object and assigns values to the
attributes/fields of an object.

218
Q

Encapsulation

A

Combining fields and methods describing an object into one class.

219
Q

Helper method

A

A private method in an object/class. A method which assists/uses another method

220
Q

Information Hiding

A

The principle of allowing controlled access to the attributes of an object through methods
(such as gets, sets and toString) while securing those attributes by making them Private or
Protected.

221
Q

Inheritance

A

The methods and attributes of a parent class are available to a Child class in order to create
reliable reusable code.

222
Q

Methods/behaviours

A

In object-oriented programming, a method (or member function) is a subroutine (or
procedure or function) designed to act on the object’s fields.

223
Q

Mutator

A

Commonly known as a set method. A method in object oriented programming which changes
the value of an object’s field/attributes.

224
Q

Object

A

An instance of a class created by running the constructor method of the class. The Object
inherits the attributes and methods defined in the class.

225
Q

OOP design

A

Object-oriented design is the process of planning a system of interacting objects for the
purpose of solving a software problem. It is one approach to software design.

226
Q

Overloading

A

Methods in the same class which have the same name but have different parameters.
Parameters may be of a different type and/or the number of parameters may be different.

227
Q

Overriding

A

Methods, one in a parent class and the other in a child class which have the same name and
parameters. The method in the child class is invoked rather than the parent class method